Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 21209 dokumen yang sesuai dengan query
cover
Benny, Daniel J
"Machine generated contents note: 1.Importance of Culture Property Protection: Museums, Historic Sites, Archives, and Libraries
Introduction
Museums
Private Museums
Local Museums
County Museums
State Museums
National Museums
Military Museums
Historic Sites
Private, Local, and County Historic Sites
State Historic Sites
National Historic Sites
Archives
Private, Local, and County Archives
State Archives
National Archives
Libraries
Private Libraries
Campus Libraries
Local Libraries
County Libraries
State Libraries
National Libraries
Summary
Bibliography
2.Security Threats to Museums, Historic Sites, Archives, and Libraries
Security Threats to Museums
Security Threats to Historic Sites
Security Threats to Archives
Security Threats to Libraries
Security Threats to Individuals
Workplace Violence
Prevention of Violence in the Workplace
Identification of Behavioral Indicators
Contents note continued: Threats from Terrorism
Target Selection
Counter Terrorism
Signs of Terrorism
3.Physical Security Protection for Museums, Historic Sites, Archives, and Libraries
Intrusion and Fire Detection Systems
Security Cameras
Determining Total System Costs
Design Costs
Installation Costs
Operational Costs
IT Costs
Maintenance Costs
Replacement Costs
Cost-Benefit Analysis
Cost Factors
Benefit Factors
Cost of Loss
Prevention Costs
Return on Investment
Lock and Key Control
Mechanical Locks
Wafer Tumbler Locks
Dial Combination Locks
High Security Dead Bolt Locks
Card Access Electrified Locks
Exit Locks
Master Locking Systems
Control of Keys and Locking Devices
Master Keys
Duplication
Lost Keys
Disposition at Transfer or Termination
Security Containers
Security Filing Cabinets
Security Barriers and Fencing
Security Lighting
Contents note continued: Protection of Windows and Utility Ports
Radio Frequency Identification, Magnetometers, and X-Ray Devices
Protection of Artifacts
Artifacts on Display
Artifacts in Storage
Artifacts in Transit
Protection of Books, Publications, Documents, and Photographs
Internet Protection
4.Security Department Organization and Operation
Chief Security Officer
Determining Size of Department
Mission
Legal Authorization to Protect Property
Property Profile and Security Threats
Proprietary Security Force
Contract Security Force
Uniforms and Identification
Staff and Visitor Identification
Protective Equipment
Use of Force Continuum
Vehicles
Communications
Report Procedures
Protection of Department Information
Lost and Found
Ethics and Conduct
Ethics
Conduct
Training
Professional Certifications
Recruitment and Supervision
Patrols
Service Calls
Vehicle Stops
Contents note continued: Authority
Approaching Suspect Vehicle with Patrol Vehicle
Felony Vehicle Inquiries
Use of Force
Handcuffs
Oleoresin Capsicum (OC)
Extremities as Defensive Weapons
Batons
Firearms
Investigations
Apprehension and Arrest
Court Testimony
Security Information Center
Dealing with Media
5.Safety and Fire Protection
General Safety Policy
Safety Culture
Safety Program
Safety Coordinator
Fire Protection
Inspections
Protection Equipment
Fire Evacuation Plans and Drills
Employee and Visitor Protection Measures
Right-to-Know Worker Protection Act
Hazardous Chemical Inventory
Material Safety Data Sheets (MSDS)
Container Marking
Bloodborne Pathogens Act
Policy
Exposure Control Officer
Department Managers and Supervisors
Education or Training Coordinator
Employees
Exposure Determination
Universal Precautions and Engineering Controls
Contents note continued: Hepatitis B Vaccination Program
Hazardous Waste Management
6.Emergency Responses
Medical Emergencies
Responding to Medical Emergencies
Treatment of Victim
Vehicle Accidents
Fires
Evacuation
Firefighting
Gas Leaks
Important Safety Precautions
Severe Weather and Natural Disasters
Bomb Threats
Notification and Evacuation
Bomb Search
Return to Facility
Hostage Situations
Appendix A Commonwealth of Pennsylvania Library Theft Act
(Act 95 of Session 1982, 18 Purdon's Statutes [&​#x00A7;]3929.1)
House Bill 671
Appendix B Cultural Property Resources
Professional Cultural Property Security Organizations
Professional Cultural Property Organizations
Regional and State Museum Conferences and Associations
Regional Conservation Guilds and Associations
Cultural Property Journals and Publications
Cultural Property Funding Organizations
Contents note continued: Cultural Property Organizations for Reporting Thefts
Appendix C Cultural Property Physical Security Checklist
Perimeter Barriers
Protective Lighting
Intrusion Detection System
Security Communications
Personnel Identification and Control
Lock Security
Security Force
Appendix D Cultural Property Key Control Program Checklist
A.Control measures
B.Custodians appointed in writing for
C.Quarterly inspections
D.Access roster
E.Keys and padlocks
F.Key depositories
G.Combination locks
H.Seals and bands
Appendix E Cultural Property Security Force Checklist
Security Operation
Proprietary Security Department
Contract Security
Administration Issues
Miscellaneous."
Boca Raton, FL : CRC Press, 2013
363.69 BEN c
Buku Teks  Universitas Indonesia Library
cover
Benny, Daniel J
Boca Raton: CRC Press, Taylor & Francis Group, 2013
363.69 BEN c
Buku Teks  Universitas Indonesia Library
cover
Fennelly, Lawrence J.
Boston: Butterworth, 1983
069.54 FEN m
Buku Teks  Universitas Indonesia Library
cover
"Libraries are constantly at risk. Every day, many libraries and their collections are damaged by fire, flooding, high winds, power outages, and criminal behaviour. Every library needs a plan to protect its staff, sites and collections, including yours. Disaster Planning for Libraries provides a practical guide to developing a comprehensive plan for any library. Twelve chapters cover essential areas of plan development; these include an overview of the risks faced by libraries, disaster preparedness and responding to disasters, resuming operations after a disaster and assessing damage, declaring disaster and managing a crisis, cleaning up and management after a disaster and normalizing relations, staff training, testing disaster plans, and the in-house planning champion."
Waltham, MA: Chandos, 2015
e20426960
eBooks  Universitas Indonesia Library
cover
Hasna Khairiani Mulyana
"Tulisan ini secara umum membahas mengenai penerapan standar pengamanan museum yang dikeluarkan oleh International Council of Museums ICOM di Museum Nasional. ICOM sebagai salah satu organisasi internasional yang bergerak dalam bidang museum telah mengeluarkan berbagai standar pengamanan museum yang dapat diterapkan di museum-museum di seluruh dunia. Salah satu tujuan dari pengamanan museum ialah untuk mencegah terjadinya kejahatan pencurian terhadap benda koleksi. Oleh karena itu, 10 teknik pencegahan kejahatan situasional akan digunakan untuk menganalisis bagaimana peranan standar pengamanan museum yang dikeluarkan oleh ICOM tersebut dalam mencegah terjadinya pencurian benda koleksi. Selanjutnya standar ICOM tersebut akan digunakan untuk melihat apakah pengamanan di Museum Nasional telah sesuai standar atau belum.

This paper generally discusses about the application of the museum security standards issued by the International Council of Museums ICOM in Museum Nasional. ICOM as one of the international organizations which focuses on the museum and its security has issued a variety of museum security standards that can be applied by museums management around the world. One of the goals of securing the museum is to prevent the occurrence of crimes such as theft of a collection of objects. Therefore, 10 situational crime prevention techniques will be used to analyze the role of museum security standards issued by the ICOM in preventing the theft of museum collections. Furthermore, the ICOM standards will be used to analyze whether or not the security at Museum Nasional has met with those standards."
Depok: Universitas Indonesia, 2016
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
London: ICOM, 1993
R 069.54 MUS
Buku Referensi  Universitas Indonesia Library
cover
Palmer, Martin
London: Faced Publishing, 2009
025.82 PAL m
Buku Teks  Universitas Indonesia Library
cover
Lukman Fajar
"Teknologi informasi secara umum sudah dimanfaatkan oleh institusi pemerintah untuk menjalankan sebagian besar tugas pokok dan fungsinya. Seiring meningkatnya ketergantungan organisasi pemerintah terhadap ketersediaan layanan teknologi informasi, kekhawatiran terhadap terganggunya layanan akibat terjadinya bencana semakin meningkat. Direktorat Jenderal Kekayaan Intelektual DJKI sebagai salah satu insititusi pemerintah yang memberikan pelayanan langsung kepada masyarakat pada saat ini belum memiliki dokumen perencanaan terkait dengan perlindungan aset pada saat terjadi gangguan atau bencana. Karena itu perlu disusun sebuah dokumen perencanaan yang dapat dijadikan sebagai acuan bagi DJKI dalam upaya untuk memulihkan kondisi layanan SI/TI disaat kritis serta upaya untuk tetap terus memberikan pelayanan kepada masyarakat. Disaster Recovery Plan DRP merupakan dokumen yang mendefinisikan setiap aktifitas, tindakan, serta prosedur yang harus dilakukan terkait pemulihan bencana.
Penelitian ini bertujuan untuk membuat sebuah rancangan DRP bagi DJKI dengan menggunakan metodologi NIST SP 800-34 Rev. 1. Penelitian ini dilakukan dengan melakukan identifikasi dan penilaian pada aset SI/TI yang dimiliki DJKI, untuk kemudian menentukan strategi dan teknologi yang tepat untuk proses pemulihan bencana.
Hasil dari penelitian ini adalah sebuah rancangan DRP yang telah disesuaikan dengan kondisi organisasi DJKI. Dokumen DRP yang dimiliki untuk selanjutnya dapat dimanfaatkan sebagai panduan untuk membantu menjaga ketersediaan dan keandalan layanan sistem informasi yang dimiliki DJKI ketika terjadi gangguan maupun bencana.

Information technology is already used by government institutions to carry out most of their duties and functions. The concerns about the disruption of services due to the occurrence of disasters is increasing. Directorate General of Intellectual Property DGIP as one of the government institutions that provide services directly to the public, currently do not have a planning document relating to the asset protection in the event of disruption or disaster. It is necessary to develop a planning document that can serve as a reference for DGIP in an attempt to recover the services of IS IT in a crisis situation and helps to continue provide services to the public. Disaster Recovery Plan DRP is a document that defines each activity, action, and the procedures to be undertaken in disaster recovery.
This research aims to create a design for DGIP DRP using the methodology of NIST SP 800 34 Rev. 1. This research was conducted with the identification and assessment of the assets of IS IT owned by DGIP, then determine the appropriate strategies and technologies for disaster recovery process.
Results from this study is a DRP draft which has been adapted to the conditions of DGIP organization. DRP document can be used as a guide to help maintain the availability and reliability of information systems owned by DGIP when an interruption or disaster happened.
"
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2017
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Barus, Jan Harianda
"Keamanan website adalah komponen penting untuk melindungi dan mengamankan situs web dan server. Situs Web dipindai untuk mengetahui kerentanan dan malware melalui perangkat lunak keamanan situs website. Kerentanan dalam teknologi informasi (IT), adalah cacat dalam kode atau desain yang menciptakan titik kompromi keamanan potensial untuk titik akhir atau jaringan. Kerentanan menciptakan kemungkinan vektor serangan, dimana penyusup dapat menjalankan kode atau mengakses memori sistem target. Tools OWASP-ZAP adalah fitur untuk melakukan penetration testing pada sebuah website. SCELE adalah salah satu platform yang disediakan Universitas Indonesia untuk mengakses info akademis. Dengan tool OWASP-ZAP pendeteksian kerentanan pada website SCELE dapat dilakukan serta analisa dari hasil kerentanan tersebut juga dapat disimpulkan agar dapat menjadi acuan untuk memperbaiki sistem SCELE yang telah ada.

Website security is an important component to protect and secure websites and servers. The website is scanned to find out vulnerabilities and malware through website security software. Vulnerability in information technology (IT), is defect in code or design that creates a point of potential security compromise for endpoint or network. Vulnerability creates the possibility of an attack vector, where intruders can run code or access the target systems memory. The OWASP-ZAP tool is a feature for penetration testing of a website. Scele is one of the platform provided by University of Indonesia to access academic info. With OWASP-ZAP tool, vulnerability detection on the SCELE website can be done and and analysis of the result of these vulnerabilities can also be concluded to be reference to improve the existing SCELE system."
Depok: Fakultas Teknik Universitas Indonesia, 2019
S-Pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Aprilia Rahmawati
"Berkembang pesatnya teknologi informasi saat ini sejalan dengan berkembangnya aplikasi berbasis android dan website. Website umumnya digunakan sebagai media informasi dan komunikasi yang tentunya memiliki peran yang sangat penting. Namun, tidak menutup kemungkinan bahwa terdapat ancaman terkait dengan celah keamanan dari suatu website, baik kejahatan cyber, kebocoran data, pencurian data, dan merusak data maupun hanya ingin mengganggu system tersebut. Sebagai contoh pada website admin Digital Outlet yang merupakan pusat dari pengelolaan suatu website application. Dalam website admin tersebut telah tersimpan data dan informasi penting penggunanya yang bersifat sensitif. Maka, perlu adanya perhatian khusus terkait keamanan website tersebut. Pada penelitian ini akan dilakukan vulnerability assessment dan penetration testing pada situs website Digital Outlet menggunakan metode Information System Security Assessment Framework (ISSAF) dengan melakukan pengujian untuk mencari celah keamanan yang umum terjadi pada website tersebut, khususnya celah keamanan pada Broken Access Control, Cross Site Scripting (XSS), SQL Injection, dan sebagainya. Hasil dari penelitian analisis uji kerentanan yang diperoleh pada website Digital Outlet nantinya akan pergunakan untuk memperbaiki dan meningkatkan keamanan pada website tersebut serta menjadi salah satu referensi dalam memberikan rekomendasi terkait pengembangan framework Basic Development Framework (BDF) untuk management struktur rancang bangun suatu website yang baik dan aman. 

The rapid development of information technology is currently in line with the development of Android-based applications and website. Website are generally used as a medium of information and communication which of course has a very important role. However, it is possible that there are threats related to the security gaps of a website, both cyber crime, data leaks, data theft, and damage to data or just wanting to disrupt the system. For example, on the Digital Outlet admin website, which is the center of managing a website application. The admin website has stored important sensitive data and information on its users. So, there needs to be special attention regarding the security of the website. In this research, vulnerability assessment dan penetration testing will be carried out on the Digital Outlet website using the Information System Security Assessment Framework (ISSAF) method by conducting tests to find security holes that commonly occur on the website, especially security holes in Broken Access Control, Cross Site Scripting (XSS), SQL Injection, and so on. The results of the vulnerability test analysis research obtained on the Digital Outlet website will later be used to improve and increase security on the website and become a reference in providing recommendations related to the development of the Basic Development Framework (BDF) framework for the management structure of a good website design and build safe."
Depok: Fakultas Teknik Universitas Indonesia, 2023
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>